General

  • Target

    2024-04-20_8e3114f8e53f0573afcaf0e8668e0ebf_cryptolocker

  • Size

    65KB

  • MD5

    8e3114f8e53f0573afcaf0e8668e0ebf

  • SHA1

    3b3f513649eef91235cda64257c327baee4ab6ec

  • SHA256

    e43c674bd7c8c49e9202d20f71ae387084e95df560f30cec2662d005178c4636

  • SHA512

    02032241682e31168f7139b64ed6c98155d712ed7b150c71b9df8c5c2e37241831368176f4aa771541393bbae37c75df767c7d100a4e0d69508ecd35b23bfd71

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5Bs:zj+soPSMOtEvwDpj4kpmeLmQ/s

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_8e3114f8e53f0573afcaf0e8668e0ebf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections